One Hacked Android User Can Lead To An Enterprise Breach

DEF CON 21 – Las Vegas – Weaknesses in a single sign-on feature for Google Android devices can lead an attacker to compromise an entire organization via its Google Apps domain, a security researcher revealed here over the weekend.

Craig Young, senior security researcher with Tripwire, discovered multiple attack vectors that would allow a bad guy to target just one Android device to gain a foothold into the victim's Google cloud applications. The weak link is the so-called "weblogin" token used by Android to allow users to sign on once for all Google services, and it can be cheated when the attacker grabs the weblogin token and gains control of the access domain control panel.

"I can fully compromise Google Apps. It only takes one token," Young told the DEF CON 21 audience.

Young, who previously demonstrated how Android could be used to bypass Google's two-step authentication, says he had been curious about the risks of using Android in conjunction with Google Apps.

Android's weblogin feature basically uses cookies rather than passwords for accessing Google services. But the feature's convenience comes with tradeoffs: if an attacker uses it to access the domain control panel, he then can reset passwords, perform "data dumps," and download drive documents, Young said.

"The reason I [went] with this token research is I bought an Android tablet about a year ago and realized Chrome auto-signed me into Google's websites, which made me very unhappy. At that time, I hadn't realized Google Apps control panel was exposed this way, too: it was a real revelation," Young said in an interview with Dark Reading. "I had used Google Apps domain for a while now, and had always logged in using that admin account."

But after realizing the potential dangers, Young stopped that practice and launched his latest research.

Young says the best way to prevent such attacks is to avoid using an admin account on Android and to be suspicious of token requests. And the usual due diligence: shop only at trusted app stores and from trusted vendors, and run antivirus to look for root exploits.

"Companies using Google for the cloud need to make sure that their IT admins who need to have admin access to the Google Apps control panel do so but not necessarily from their [Android] phones. If they do, then they need to enter a password," he says.

Google was notified of Young's findings earlier this year. Google as of this posting had not responded to a request for comment on Young's research.

"Google has addressed some things," Young says. "They told me everything would and should be fixed, but it's not ... They need to block off access to the Google Apps control panel."

Young says a bad guy can access an Android user's weblogin or token, using a root exploit or rigged app. "Then they can access your Gmail and read all [of your mail] and contacts and start resetting your passwords for sites that you use for that account. That's a scary thing," he told the DEF CON audience. "You might not recognize that someone else is using your account," either.

Even if an attacker doesn't grab the admin phone token, he can still grab the weblogin token and access all of the documents the Android user has accessed, he said.

Young tested just how easy it would be for an attacker to plant a malicious app in the Google Play store. He created a phony app selling for $150 called "Stock Viewer" that sat undetected for about a month, even with the description: "This application provides quick access to your Google Stock Portfolio while completely compromising your privacy. If you prefer convenience over security then this app is for you! This application is currently under testing and should not be installed by anyone EVER."

The app didn't contain a root exploit, but Young says if it had, he's confident that Google would have caught the malicious code. Even so, Play and even Apple's store aren't foolproof. "They're not doing source-code review—they just look at the stuff in binary format. So you can't assign trust to Google or Apple for their stores" in actuality, Young contends.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Indeed, the Android market is far less regulated then others, but Google will react and pull apps if there are complaints or known to have vulnerabilities which might impact users. Android phones also make it easy to install non-market apps (simple setting in the OS), which requires a jailbreak in an apple device. I recommend reading further on this topic in the following article:

I found this article's title to be disingenuous and unethically sensationalist, since it slyly implies that any hacked Android user is a risk to the Enterprise, and that's just not the case since that user has to be an Admin with Apps control panel rights. Poor form Miss Higgins, you just lost my trust and respect.

Published: 2015-03-03Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

Published: 2015-03-03** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.